Cybersecurity TRENDING

The CCT Certification covers the most in demand skills required to land a technical, entry level Job in Cybersecurity. Whether you are just getting started or transitioning from an IT role into a Cybersecurity role, CCT proves you have the knowledge and skills required to be a valuable, contributing member of the Cyber Team.

DURATION:
5 Months

Course Overview

The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to address the global need for cybersecurity technicians with strong foundational skills.

This course will get you up to speed starting with basic concepts such as variables, data types, arrays, loops and take you into a deeper Look of MVC.

Scope

The CCT Certification covers the most in demand skills required to land a technical, entry level Job in Cybersecurity. Whether you are just getting started or transitioning from an IT role into a Cybersecurity role, CCT proves you have the knowledge and skills required to be a valuable, contributing member of the Cyber Team. CCT is one of two fully practical certification exams delivered by ECCouncil, the CCT practical is conducted on a live Cyber Range with skill-based objectives, run in a Capture the Flag format.

Target Audience

This course typically includes individuals who are interested in pursuing a career in the field of cybersecurity and have a foundational understanding of computer systems and networking.

Course Content

...

Module 01 Information Security Threats and Vulnerabilities

  • JPS Virus Maker, Spytech SpyAgent and more

Module 02 Information Security Attacks

  • Exploit DB, Burp Suite, John-the-Ripper, Aircrack-ng and more

Module 03 Identification, Authentication and Authorization

  • WAC, AD, pfsense (machines used) and more

Module 04 Network Security Controls - Technical Controls

  • pfsense firewall, Suricata, Splunk, HoneyBOT and more

Module 05 Network Security Assessment Techniques and Tools

  • Google Hacking Database, ThreatCrowd, Tor Browser, Common Weakness Enumeration (CWE) and more

Module 06 Application Security

  • AppLocker, Sandboxie, OWASP ZAP and more

Module 07 Virtualization and Cloud Computing

  • Docker-Bench-Security , Google Cloud Platform and more

Module 08 Mobile Device Security

  • Miradore MDM Solution

Module 09 IoT and OT Security

  • Bevywise IoT simulator

Module 10 Cryptography

  • HashCalc, OpenStego and more

Module 11 Data Security

  • BitLocker Drive Encryption, Genie Backup Manager and more

Module 12 Network Troubleshooting

  • Nmap, Hping3 and more

Module 13 Network Traffic Monitoring

  • Wireshark, tcpdump and more

Module 14 Network Logs Monitoring and Analysis

  • Event Viewer

Module 15 Incident Response

  • buck-security, VirusTotal and Peid, GPMC

Module 16 Computer Forensics

  • PsTools, Autopsy, AccessData FTK Imager and more